DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Last call! Secure your stack and shape the future! Help dev teams across the globe navigate their software supply chain security challenges.

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workloads.

Releasing software shouldn't be stressful or risky. Learn how to leverage progressive delivery techniques to ensure safer deployments.

Avoid machine learning mistakes and boost model performance! Discover key ML patterns, anti-patterns, data strategies, and more.

The Latest Security Topics

article thumbnail
Don't Just Let It iPaaS: How To Get More Out of Your Digital Transformation
Learn about the fundamental principles of iPaaS that can accelerate digital transformation at an incredible pace.
February 16, 2024
by Shivank Shukla
· 7,976 Views · 2 Likes
article thumbnail
The Noticeable Shift in SIEM Data Sources
Early SIEM solutions faced hurdles, especially from their data sources. Learn about their evolution over time from cloud to IoT Devices, among others.
February 15, 2024
by Diamaka Aniagolu
· 4,803 Views · 2 Likes
article thumbnail
K8s Network Policy Automation in Falco Talon
Protect your Kubernetes environment with Talon Response Actions. Automatically enforce Calico Network Policies to secure your network and stay compliant.
February 14, 2024
by Nigel Douglas
· 4,760 Views · 2 Likes
article thumbnail
Securing Applications Throughout the Software Development Lifecycle
Embed security throughout SDLC, utilize pentesting, and follow frameworks like ISO 27034 and OWASP SAMM to strengthen defenses against costly breaches.
February 14, 2024
by Den Smyrnov
· 2,219 Views · 1 Like
article thumbnail
Integration Security and Safety When Connecting With External Systems
Integration security is all about safeguarding your data in connected systems. In this article, we'll explore various best practices to ensure your integration is secure.
February 13, 2024
by Teja Bhutada
· 4,258 Views · 1 Like
article thumbnail
Hybrid Cloud Backup: A Comprehensive Guide To Securing Your Data
A guide to securing data through hybrid cloud backup, covering key concepts, security measures, implementation strategies, and best practices.
February 13, 2024
by Alex Tray
· 3,738 Views · 1 Like
article thumbnail
How to Onboard and Protect Remote Teams With Secure Cloud Environments
Secure cloud environments transform remote software development, aiding organizations with remote teams to onboard and manage them cost-effectively.
February 13, 2024
by Laurent Balmelli, PhD
· 2,556 Views · 2 Likes
article thumbnail
Designing for Security
Security should be a top priority in development and proper testing mechanisms should be implemented for both security and functionality.
February 13, 2024
by Pranav Kumar Chaudhary
· 4,337 Views · 1 Like
article thumbnail
Securing Your AWS RDS Instances: Best Practices and Examples
Securing your AWS RDS instances is crucial to protecting your data. This article explores best practices for securing AWS RDS instances, supported by practical examples.
February 13, 2024
by Vijay Panwar DZone Core CORE
· 3,024 Views · 1 Like
article thumbnail
Security Considerations in Kubernetes
In this comprehensive guide, we will explore the key security aspects of Kubernetes, including best practices and recommendations.
February 13, 2024
by Aditya Bhuyan
· 4,289 Views · 2 Likes
article thumbnail
Managing IoT Edge Devices at Scale: Device Lifecycle and Configuration Management
AI-driven device management in IoT uses ML for predictive maintenance, adaptive configs, anomaly detection, self-healing, and resource optimization.
February 12, 2024
by Deep Manishkumar Dave
· 4,394 Views · 1 Like
article thumbnail
Build a Digital Collectibles Portal Using Flow and Cadence (Part 1)
Understand more about the Flow blockchain and Cadence smart contract language by building a new website focused on collecting digital collectibles.
February 12, 2024
by John Vester DZone Core CORE
· 50,933 Views · 2 Likes
article thumbnail
VPN Log vs. Zero-Log Policy: A Comprehensive Analysis
Discover the impact on privacy and troubleshooting in our comprehensive analysis, guiding you to make informed choices for a secure online experience.
February 12, 2024
by Emmanuel Ohaba
· 2,529 Views · 2 Likes
article thumbnail
The Impact of Open-Source Software on Public Finance Management
Open-source software is revolutionizing public finance with cost-effective, transparent, and collaborative management solutions.
February 11, 2024
by Devin Partida
· 4,314 Views · 1 Like
article thumbnail
Combating Malware Threats
Understanding the diverse array of malware types is crucial for individuals, organizations, and cybersecurity professionals.
February 9, 2024
by Saurav Bhattacharya
· 4,518 Views · 1 Like
article thumbnail
Evolution of Privacy-Preserving AI: From Protocols to Practical Implementations
Let's examine the correlation between AI systems, machine learning, and the utilization of sensitive information.
February 9, 2024
by Petr Emelianov
· 18,126 Views · 36 Likes
article thumbnail
Securing the Keys to the Kingdom: Exploring the Depths of Privileged Access Management (PAM)
Discover how PAM, a key element of Zero Trust architecture, safeguards privileged access to secure sensitive information and prevent unauthorized access.
February 9, 2024
by Nitin Uttreja
· 6,643 Views · 1 Like
article thumbnail
Hardening Apache APISIX With the OWASP's Coraza and Core Ruleset
The OWASP regularly publishes a Top 10 vulnerability report. The report targets vulnerabilities in web applications. Here, learn how to fix some of them.
February 8, 2024
by Nicolas Fränkel DZone Core CORE
· 2,602 Views · 2 Likes
article thumbnail
Best Practices To Create Highly Secure Applications in Mule 4
In this blog, I would like to share a few best practices for creating highly secure applications in Mule 4 for all deployment options.
February 8, 2024
by PRAVEEN SUNDAR
· 3,305 Views · 1 Like
article thumbnail
Good Application Security Posture Requires Good Data
Application Security Posture Management, ASPM, is only as good as the data sources. Learn about the pitfalls and what to look for in tools and scanners.
February 8, 2024
by Dwayne McDaniel
· 2,758 Views · 1 Like
  • Previous
  • ...
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: